# Login & Single Sign-on (SSO)

In this guide we will walk you through the steps to configure and setup your organization's SSO to let users log in with corporate credentials.

Single sign-on (SSO) is an authentication method that allows you to securely log in to multiple apps and sites using a single set of credentials. You can set up SSO to restrict which login methods users can use to access their Reo.Dev. If your team uses SSO authentication, you can set up SSO for Reo.Dev. We support IDP-initiated SSO through SAML and OAuth integrations and the following SSO providers are supported:

* Google
* Microsoft
* Microsoft EntraID&#x20;
* Okta

If you’d prefer not to use the above methods - you can choose to login via password. If you choose this option - you can enter your login email and a link to set a password will be sent on your email. You can set the password and use it to log into Reo.Dev.

{% hint style="info" %}
Few things to note:&#x20;

* By default - the password option is selected. If you’re logging in for the first time you need to set a password and then login to the platform. Once you’re logged in you can configure SSO login.
* Only users with ‘ADMIN’ role can configure SSO.
* Sign-in with Google and Microsoft is available on all plans. Sign in with SSO is available only on large and enterprise plans.
  {% endhint %}

### **Configuring SSO on Reo.Dev**

**Step 1:** In the Configurations tab under the Settings section on the left, click on ‘**Configure**’ under the **Login & SSO card.**

<figure><img src="https://2705882080-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fx46P5sAHxDG7PqOdVLxI%2Fuploads%2FGjRzZA7x1FfLiEKgY7g0%2Fimage.png?alt=media&#x26;token=3090c2bb-29d4-45c5-951e-447ee92dac16" alt=""><figcaption></figcaption></figure>

**Step 2:** Select the SSO option

<figure><img src="https://2705882080-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fx46P5sAHxDG7PqOdVLxI%2Fuploads%2F3yIJDBWXrVEZypTGoJxq%2Fimage.png?alt=media&#x26;token=64cd729f-10d7-41be-803c-6fbb1c922999" alt=""><figcaption></figcaption></figure>

**Step 3:** Select the SSO provider from the drop-down menu

<figure><img src="https://2705882080-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fx46P5sAHxDG7PqOdVLxI%2Fuploads%2Fr2pG0VnNujKinVvmnBgW%2Fimage.png?alt=media&#x26;token=424bd0a8-1e88-4b54-b84a-ae56999350aa" alt=""><figcaption></figcaption></figure>

{% hint style="info" %}
Note: Microsoft Entra is available only on select plans. In case you don't see it in the drop-down menu, it's not included in your current plan.&#x20;
{% endhint %}

To set up SSO, follow the steps of your provider:

* **Google**

  * Select Google from the drop-down menu.
  * Then, click on Save and Enforce

  <figure><img src="https://2705882080-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fx46P5sAHxDG7PqOdVLxI%2Fuploads%2FQl3IudgMNoOxmQlm9RSg%2Fimage.png?alt=media&#x26;token=654cc9bc-f3a7-4420-8cc8-2cf62ad0386c" alt=""><figcaption></figcaption></figure>

* **Microsoft**
  * Select Microsoft from the drop-down menu.
  * Then, click on Save and Enforce SSO

<figure><img src="https://2705882080-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fx46P5sAHxDG7PqOdVLxI%2Fuploads%2FfvIOCPyNYLnq0WQiZLLY%2Fimage.png?alt=media&#x26;token=d2c1d916-77a5-404e-8c9d-d4f265bf6365" alt=""><figcaption></figcaption></figure>

* **Microsoft Entra**

  * Select Microsoft Entra from the SSO provider dropdown
  * Configure Reo in your Identity Provider: Copy the Reo.Dev single sign on URL, Audience URL and sign-on URL (optional) to **create a custom app** in Microsoft Entra.&#x20;

  <figure><img src="https://2705882080-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fx46P5sAHxDG7PqOdVLxI%2Fuploads%2F22F6OXDXHOeIga7CbI5C%2Fimage.png?alt=media&#x26;token=f1432f8e-708d-4d81-9284-ecc137804492" alt=""><figcaption></figcaption></figure>

  * Once you’ve created a custom app, **upload the federation metadata file.** Once you upload the file, the following fields from your IDP will be auto-filled in Re&#x6F;**:**&#x20;

    * Identity Provider Issuer URL
    * Identity Provider SSO URL
    * X.509 Certificate

  <figure><img src="https://2705882080-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fx46P5sAHxDG7PqOdVLxI%2Fuploads%2FXDK7lQ7VxICbzMo3pvoj%2Fimage.png?alt=media&#x26;token=cf29f88f-0f9d-487d-99ed-69034cd6a1e8" alt=""><figcaption></figcaption></figure>

  * Then, click on Save and Enforce

<figure><img src="https://2705882080-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fx46P5sAHxDG7PqOdVLxI%2Fuploads%2FP7Nb7Eiw3mWkbWGRMHOT%2Fimage.png?alt=media&#x26;token=2d9c7102-eb2a-4190-9b34-56646a31efba" alt=""><figcaption></figcaption></figure>

{% hint style="warning" %}
Note: Only XML format files are supported. \
In case you see a failure message please check if the XML file uploaded is accurate. If the issue still persists, please reach out to your account manager to resolve this at the earliest.
{% endhint %}

Note: To add a new user, an admin must send an invitation from. Settings → Users —> Invite teammates.

* **Okta**&#x20;

  * Select Okta from the SSO provider dropdown
  * Configure Reo in your Identity Provider: Copy the Reo.Dev single sign on URL, Audience URL and sign-on URL (optional) to **create a custom app** in Okta

  <figure><img src="https://2705882080-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fx46P5sAHxDG7PqOdVLxI%2Fuploads%2FtQj5fGYR7RjO3qHGgyP6%2Fimage.png?alt=media&#x26;token=5b98a924-483d-489f-9340-ae31a8b0f951" alt=""><figcaption></figcaption></figure>

  * Once you’ve created a custom app, **upload the federation metadata file.** To get the XML Metadata file from Okta, follow these steps in Okta.

    * Login to your Okta Dashboard and **head to the Admin console** (Ensure you have admin access)
    * Navigate to **Applications > Applications**

    <figure><img src="https://2705882080-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fx46P5sAHxDG7PqOdVLxI%2Fuploads%2FRyVNid6buq0GUzZMfx4I%2Fimage.png?alt=media&#x26;token=9517662c-446e-4b01-89fa-1dd7c38956fc" alt=""><figcaption></figcaption></figure>

    * **Select the custom app** you created for Reo

    <figure><img src="https://2705882080-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fx46P5sAHxDG7PqOdVLxI%2Fuploads%2F2FrTp7SqVLk45CgJDh1X%2Fimage.png?alt=media&#x26;token=629daba7-b595-4b87-98a5-7adf98c21322" alt=""><figcaption></figcaption></figure>

    * Head to the **Sign-on tab**

    <figure><img src="https://2705882080-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fx46P5sAHxDG7PqOdVLxI%2Fuploads%2FR7rT2TwZGfWF5x1EGyOT%2Fimage.png?alt=media&#x26;token=4d7a6eae-0117-4a79-a24a-3fd9ef34df56" alt=""><figcaption></figcaption></figure>

    * In the SAML set-up section, click on **‘View SAML setup instructions’**

    <figure><img src="https://2705882080-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fx46P5sAHxDG7PqOdVLxI%2Fuploads%2FoYvRambssuf35DOdyiyI%2Fimage.png?alt=media&#x26;token=b1ce57c7-5b90-407e-8740-2c2ded195658" alt=""><figcaption></figcaption></figure>

    * Copy the IDP Metadata code and download it in the XML format

    <figure><img src="https://2705882080-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fx46P5sAHxDG7PqOdVLxI%2Fuploads%2FIpivOqKyWDQTh59j85Qj%2Fimage.png?alt=media&#x26;token=d524170f-80e9-4bc2-9a03-1a9d56ceb19c" alt=""><figcaption></figcaption></figure>

  * **Upload the federation metadata file on Reo.** Once you upload the file, **the following fields from your IDP will be auto-filled in Reo:**
    * Identity Provider Issuer URL
    * Identity Provider SSO URL
    * X.509 Certificate

  <figure><img src="https://2705882080-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fx46P5sAHxDG7PqOdVLxI%2Fuploads%2FkpTXIXvoaglb8zia0eij%2Fimage.png?alt=media&#x26;token=4fb7d025-7337-43f6-8775-5e7e4ab8e162" alt=""><figcaption></figcaption></figure>

  * Then, click on **Save and Enforce**

{% hint style="warning" %}
Note: Only XML format files are supported. \
In case you see a failure message please check if the XML file uploaded is accurate. If the issue still persists, please reach out to your account manager to resolve this at the earliest.
{% endhint %}
